Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/02/15/2 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833 | Issue Tracking Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2022/02/15/2 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833 | Issue Tracking Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2022/02/15/2 - Mailing List, Third Party Advisory | |
References | () https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833 - Issue Tracking, Patch, Vendor Advisory |
Information
Published : 2022-02-15 17:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-25196
Mitre link : CVE-2022-25196
CVE.ORG link : CVE-2022-25196
JSON object : View
Products Affected
jenkins
- gitlab_authentication
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')